Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Public IT service strategy for social information security in the intelligence all-things environment

Full metadata record
DC Field Value Language
dc.contributor.authorYoo, Jinho-
dc.contributor.authorChang, Hangbae-
dc.date.available2019-03-08T20:58:22Z-
dc.date.issued2014-11-
dc.identifier.issn1389-5753-
dc.identifier.issn1572-9362-
dc.identifier.urihttps://scholarworks.bwise.kr/cau/handle/2019.sw.cau/11686-
dc.description.abstractIn the area of public information service, information leakage through an insider is occurring frequently in recent. Considering the difficulty in tracking security breach incidents upon using cutting-edge technology instead of technology-centered security measure, establishing fundamental solution strategy is essential since the era of intelligence all-things environment is approaching which is referred to as future information & communications convergence environment. However, existing studies on the prevention of personal information leakage & misuse through insider have been centered on technical approach but security studies on managerial factor, especially, on identifying the possibility of information leakage in connection to work process have been very lacking. This study proposed ways to improve public information service for the social information security of individuals such as personal or policy information that are dealt with in public information service. It examined vulnerabilities in managerial, technical and operating environment areas for the purpose of preventing personal information leakage and misuse by selecting 8 representative public information services. For the purpose of solving such vulnerabilities, public information service strategy was deduced for preventing personal information leakage and misuse by referring to both domestic and international studies and cases on personal information protection.-
dc.format.extent27-
dc.language영어-
dc.language.isoENG-
dc.publisherSPRINGER-
dc.titlePublic IT service strategy for social information security in the intelligence all-things environment-
dc.typeArticle-
dc.identifier.doi10.1007/s10660-014-9155-2-
dc.identifier.bibliographicCitationELECTRONIC COMMERCE RESEARCH, v.14, no.3, pp 293 - 319-
dc.description.isOpenAccessN-
dc.identifier.wosid000346170100006-
dc.identifier.scopusid2-s2.0-84916936275-
dc.citation.endPage319-
dc.citation.number3-
dc.citation.startPage293-
dc.citation.titleELECTRONIC COMMERCE RESEARCH-
dc.citation.volume14-
dc.type.docTypeArticle-
dc.publisher.location네델란드-
dc.subject.keywordAuthorIntelligence all-things environment-
dc.subject.keywordAuthorIndividual information security-
dc.subject.keywordAuthorPublic information service-
dc.subject.keywordAuthorInformation service strategy-
dc.subject.keywordPlusFRAMEWORK-
dc.subject.keywordPlusCULTURE-
dc.subject.keywordPlusGOVERNANCE-
dc.subject.keywordPlusAWARENESS-
dc.relation.journalResearchAreaBusiness & Economics-
dc.relation.journalWebOfScienceCategoryBusiness-
dc.relation.journalWebOfScienceCategoryManagement-
dc.description.journalRegisteredClassssci-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Business & Economics > Department of Industrial Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Chang, Hang Bae photo

Chang, Hang Bae
경영경제대학 (산업보안학과)
Read more

Altmetrics

Total Views & Downloads

BROWSE